Section:  .. / 0504-exploits  /

Page 4 of 6
<< 1 2 3 4 5 6 >> Files 75 - 100 of 138
Currently sorted by: Last ModifiedSort By: File Name, File Size

 ///  File Name: 0x82-meOw_linuxer_forever.c
Description:
GLD 1.4 remote overflow format string exploit that binds a shell to port 36864.
Author:Xpl017Elz
Homepage:http://x82.inetcop.org
Related File:2005-0x82-026.txt
File Size:10620
Last Modified:Apr 18 10:28:04 2005
MD5 Checksum:e55ef2d56dc9463377fb00e6f3cac699

 ///  File Name: jportal231.txt
Description:
JPortal is susceptible to SQL injection attacks that allows for administrative password retrieval.
Author:Marcin Krupowicz
File Size:1119
Last Modified:Apr 18 10:21:04 2005
MD5 Checksum:848909aa48710766596ba7a78739143f

 ///  File Name: webctXSS
Description:
Unavailable.
File Size:0
Last Modified:Apr 18 10:09:26 2005
MD5 Checksum:d41d8cd98f00b204e9800998ecf8427e

 ///  File Name: invision131sql.txt
Description:
Invision board versions 1.3.1 and below are susceptible to SQL injection attacks. Patch included.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:8173
Last Modified:Apr 18 10:07:26 2005
MD5 Checksum:b4da7f7d3221907b1c414f30a8e9ed48

 ///  File Name: msjet.c
Description:
Microsoft Jet exploit that makes use of an insufficient data validation vulnerability when the parsing of a database file is performed with msjet40.dll. Tested against Windows 2000 SP4, Windows XP SP0 and SP1.
Author:Stuart Pearson
Homepage:http://www.computerterrorism.com
File Size:11452
Last Modified:Apr 18 08:35:06 2005
MD5 Checksum:663c2608a9a6f30d1df12e35b9fa6c34

 ///  File Name: modernBill.txt
Description:
ModernBill versions 4.3.0 and below suffer from file inclusion and cross site scripting vulnerabilities.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2826
Last Modified:Apr 18 08:21:50 2005
MD5 Checksum:16d7f7f7e62e3aabd9da3f00e9d8c8a6

 ///  File Name: acnews.txt
Description:
ACNews 1.0 SQL injection exploit.
Author:LaMeR
File Size:307
Last Modified:Apr 18 08:20:03 2005
MD5 Checksum:4ca382ee425228219fa634f96a49544e

 ///  File Name: AzDGDatingPlatinum.txt
Description:
AzDGDatingPlatinum 1.1.0 is susceptible to SQL injection and cross site scripting vulnerabilities.
Author:kre0n
Homepage:http://adz.void.ru/
File Size:1088
Last Modified:Apr 18 08:15:09 2005
MD5 Checksum:9cc2b0768aab8efc8124cf74e13c3675

 ///  File Name: firefly_pass_recovery.txt
Description:
Firefly filetrading software version 1.0 stores proxy passwords, if configured, in a manner that leaves them vulnerable to being discovered by any other local users.
Homepage:http://www.spyinstructors.com/show.php?name=Advisories&pa=showpage&pid=43
File Size:5707
Last Modified:Apr 18 08:12:34 2005
MD5 Checksum:dccf26a863281c0ace5680271239ba3d

 ///  File Name: includer10exec.pl.txt
Description:
Another remote command execution exploit for The Includer CGI versions 1.0 and below.
Author:K-C0d3r
File Size:2191
Last Modified:Apr 18 08:12:31 2005
MD5 Checksum:20977247bfa016015d65cb81872c0087

 ///  File Name: includer10.pl.txt
Description:
The Includer CGI versions 1.0 and below remote command execution exploit.
Homepage:http://nst.void.ru
File Size:2083
Last Modified:Apr 18 08:11:15 2005
MD5 Checksum:2e93df914fd652fa9315d146545f3cc0

 ///  File Name: sash.c
Description:
Local proof of concept exploit for a buffer overflow in sash 3.7.
Author:lammat
Homepage:http://grpower.ath.cx
File Size:1122
Last Modified:Apr 18 08:09:11 2005
MD5 Checksum:a55fd693486c254b74d143e95ae50830

 ///  File Name: p2pShareSpy.txt
Description:
P2P Share Spy 2.2 local password exploit.
Author:Kozan, ATmaCA
Homepage:http://www.spyinstructors.co
File Size:2649
Last Modified:Apr 18 08:06:47 2005
MD5 Checksum:c7b0c37fe9947d3090309c35a896ce00

 ///  File Name: radbidsGoldv2.txt
Description:
RadBids Gold version 2 is susceptible to directory traversal, SQL injection, and cross site scripting vulnerabilities.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:3808
Last Modified:Apr 18 08:04:09 2005
MD5 Checksum:150e0e21faa3127385dc9bd429410f2d

 ///  File Name: ong_bak.c
Description:
Local root exploit for the Linux kernel code that has the Bluetooth related flaw.
Author:qobaiashi
Related File:adv1.pdf
File Size:5995
Last Modified:Apr 18 07:58:33 2005
MD5 Checksum:7fed0020c78339f62868b53503ac6791

 ///  File Name: paFileDB31XSS.txt
Description:
paFileDB 3.1 is susceptible to a cross site scripting flaw in its action parameter.
Author:ne0
Homepage:http://www.securitygurus.net
File Size:212
Last Modified:Apr 18 07:58:04 2005
MD5 Checksum:5162edf6e3eb7bf62b05c681bc78c7c0

 ///  File Name: double094.txt
Description:
Double Choco Latte versions 0.9.4.3 and below are vulnerable to a remote code execution due to unsafe eval() calls.
Author:James Bercegay
Homepage:http://www.gulftech.org/
File Size:2868
Last Modified:Apr 18 07:36:36 2005
MD5 Checksum:55b526e77a9322734d393d9efdd93667

 ///  File Name: maxthon_arbitrary_read-write.html.t..>
Description:
Maxthon arbitrary-file read/write exploit example.
Author:Aviv Raff
Homepage:http://www.raffon.net/advisories/maxthon/nosecidpoc.html
Related File:maxthon_mulvulns.txt
File Size:980
Last Modified:Apr 17 22:19:07 2005
MD5 Checksum:1fdbca010994cb0c6184e491b57ca2bf

 ///  File Name: punbb_email_sql_injection.txt
Description:
PunBB forum software contains a vulnerability where SQL injection can be performed by first entering an email address containing exploitation data into the change_email function, and then redisplaying the email address. This is due to PunBB trusting data it gets from its own database.
Author:exploits
File Size:4094
Last Modified:Apr 17 22:12:11 2005
MD5 Checksum:b242610ce1957b5f242867f87a20589a

 ///  File Name: postnukeSQL.txt
Description:
PostNuke 0.760-RC3 is susceptible to SQL injection and cross site scripting attacks.
Author:Diabolic Crab
Homepage:http://www.hackerscenter.com/
File Size:2543
Last Modified:Apr 17 22:11:37 2005
MD5 Checksum:6a24eee0397120aaec68754f40024eb9

 ///  File Name: phpBBupload.txt
Description:
The up.php script in phpBB 2.0.x allows malicious remote attackers to upload files and execute them with the permissions of the webserver uid.
Author:Status-x
File Size:2506
Last Modified:Apr 17 21:51:07 2005
MD5 Checksum:78c28129d09b1486d7655ac6c6719ad0

 ///  File Name: PHPNuke76wl.txt
Description:
PHPNuke 7.6 is susceptible to multiple SQL injection vulnerabilities in the Web_Links module cXIb803.14.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com
File Size:11851
Last Modified:Apr 17 21:33:14 2005
MD5 Checksum:bdd5e09df50584c825c0b69ff51bf2b1

 ///  File Name: PHPNuke76dl.txt
Description:
PHPNuke 7.6 is susceptible to multiple SQL injection vulnerabilities in the Downloads module cXIb803.13.
Author:Maksymilian Arciemowicz
Homepage:http://securityreason.com
File Size:7771
Last Modified:Apr 17 21:32:01 2005
MD5 Checksum:1a31c1ff7481ec1ed97041607bee43c4

 ///  File Name: nokia_mms_gateway_vuln.txt
Description:
Nokia MMS "Terminal Gateway" software is vulnerable to a login-bypass issue where attackers can gain access to MMSs as long as they know the phone number to which the MMS was originally sent. Exploit URLs included in advisory.
Author:miraclemaker_gsm
File Size:1497
Last Modified:Apr 17 21:30:58 2005
MD5 Checksum:f819d25aec2f7facb4307ba1dee3c29f

 ///  File Name: linksys-WET11_pass-reset.txt
Description:
The Cisco Linksys WET11 is vulnerable to having the password reset simply by going to a known URL on the administrative interface recently after the systems administrator has logged in. It is not necessary to know the current password.
Author:Kristian Hermansen
Homepage:http://ht-technology.com
File Size:2908
Last Modified:Apr 17 21:20:06 2005
MD5 Checksum:6ca7f7cad061edc47ba030dc887e3176